Dynamic feature selection model for adaptive cross site scripting attack detection using developed multi-agent deep Q learning model
Web applications popularity has raised attention in various service domains, which increased the concern about cyber-attacks. One of these most serious and frequent web application attacks is a Cross-site scripting attack (XSS). It causes grievous harm to victims. Existing security methods against X...
| Main Authors: | Kareem Thajeel, Isam, Samsudin, Khairulmizam, Hashim, Shaiful Jahari, Hashim, Fazirulhisyam |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Elsevier
2023
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/107421/ http://psasir.upm.edu.my/id/eprint/107421/1/107421.pdf |
Similar Items
Machine and deep learning-based XSS detection approaches: a systematic literature review
by: Thajeel, Isam Kareem, et al.
Published: (2023)
by: Thajeel, Isam Kareem, et al.
Published: (2023)
Mitigating cross-site scripting attacks with a content security Policy
by: Yusof, Imran, et al.
Published: (2016)
by: Yusof, Imran, et al.
Published: (2016)
Preventing persistent cross-site scripting (XSS) attack by applying pattern filtering approach
by: Yusof, Imran, et al.
Published: (2014)
by: Yusof, Imran, et al.
Published: (2014)
Buffer overflow attack mitigation via Trusted Platform Module (TPM)
by: Teh, Jia Yew, et al.
Published: (2014)
by: Teh, Jia Yew, et al.
Published: (2014)
Secure coding in cross site scripting
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
Defending Malicious Script Attacks Using Machine
Learning Classifiers
by: Nayeem, Khan, et al.
Published: (2017)
by: Nayeem, Khan, et al.
Published: (2017)
Deep learning-based classification model for botnet attack detection
by: Ahmed, Abdulghani Ali, et al.
Published: (2020)
by: Ahmed, Abdulghani Ali, et al.
Published: (2020)
Cross-site scripting detection based on an enhanced genetic algorithm
by: Hydara, Isatou, et al.
Published: (2015)
by: Hydara, Isatou, et al.
Published: (2015)
The limitations of cross-site scripting vulnerabilities detection and removal techniques
by: Hydara, Isatou, et al.
Published: (2021)
by: Hydara, Isatou, et al.
Published: (2021)
Towards cross-site scripting vulnerability detection in mobile web applications
by: Hydara, Isatou, et al.
Published: (2018)
by: Hydara, Isatou, et al.
Published: (2018)
An approach for cross-site scripting detection and removal based on genetic algorithms.
by: Hydara, Isatou, et al.
Published: (2014)
by: Hydara, Isatou, et al.
Published: (2014)
Automatic generation of content security policy to mitigate cross site scripting
by: Mhana, Samer Attallah, et al.
Published: (2016)
by: Mhana, Samer Attallah, et al.
Published: (2016)
Security impact of cross-site scripting vulnerabilities on web applications and their awareness
by: Hydara, Isatou, et al.
Published: (2022)
by: Hydara, Isatou, et al.
Published: (2022)
Home (Script)
by: Brown Ash, M., et al.
Published: (2015)
by: Brown Ash, M., et al.
Published: (2015)
Towards removing cross-site scripting vulnerabilities from mobile web applications
by: Hydara, Isatou, et al.
Published: (2018)
by: Hydara, Isatou, et al.
Published: (2018)
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
by: Hydara, Isatou
Published: (2015)
by: Hydara, Isatou
Published: (2015)
Short-term load forecasting utilizing a combination model: a brief review
by: Ahmad, Faisul Arif, et al.
Published: (2024)
by: Ahmad, Faisul Arif, et al.
Published: (2024)
Improved undetected error probability model for JTEC and JTEC-SQED coding schemes
by: Flayyih, Wameedh Nazar, et al.
Published: (2013)
by: Flayyih, Wameedh Nazar, et al.
Published: (2013)
Current state of research on cross-site scripting (XSS) – a systematic literature review
by: Hydara, Isatou, et al.
Published: (2015)
by: Hydara, Isatou, et al.
Published: (2015)
Performance evaluation of activation functions in deep residual networks for short-term load forecasting
by: Liu, Junchen, et al.
Published: (2025)
by: Liu, Junchen, et al.
Published: (2025)
Distributed Denial of Service Attack Detection in IoT Networks using Deep Learning and Feature Fusion: A Review
by: Nuhu Ahmad, Abdulhafiz, et al.
Published: (2024)
by: Nuhu Ahmad, Abdulhafiz, et al.
Published: (2024)
Distributed denial of service attack Detection in IoT networks using deep learning and feature fusion : A review
by: Nuhu Ahmad, Abdul hafiz, et al.
Published: (2024)
by: Nuhu Ahmad, Abdul hafiz, et al.
Published: (2024)
Modeling of post-incident root cause analysis for cross site request forgery (CSRF) attack
by: Mustafa, Mohd Nawawi
Published: (2015)
by: Mustafa, Mohd Nawawi
Published: (2015)
Short-term load forecasting utilizing a PSO and LSTM combination model:a brief review
by: Ahmad @ Mohd Yusoff, Faisul Arif, et al.
Published: (2024)
by: Ahmad @ Mohd Yusoff, Faisul Arif, et al.
Published: (2024)
Energy trust system for detecting sybil attack in clustered wireless sensor networks
by: Alsaedi, Noor, et al.
Published: (2015)
by: Alsaedi, Noor, et al.
Published: (2015)
An Arabic Script Recognition System
by: Alginahi, Yasser M., et al.
Published: (2015)
by: Alginahi, Yasser M., et al.
Published: (2015)
IDS for Improving DDoS attack recognition based on attack profiles and network traffic features
by: Sallam, Amer A., et al.
Published: (2020)
by: Sallam, Amer A., et al.
Published: (2020)
Neuroscience-inspired artificial vision feature parallelism and deep learning models, a comparative study ii depth
by: Hassan, Marwa Yousif, et al.
Published: (2019)
by: Hassan, Marwa Yousif, et al.
Published: (2019)
Removing cross-site scripting vulnerabilities from web applications using the OWASP ESAPI security guidelines
by: Hydara, Isatou, et al.
Published: (2015)
by: Hydara, Isatou, et al.
Published: (2015)
Removing cross-site scripting vulnerabilities from web applications using the OWASP ESAPI security guidelines
by: Hydara, Isatou, et al.
Published: (2015)
by: Hydara, Isatou, et al.
Published: (2015)
Adaptive design model on heterogeneous Learning Management System (LMS) by utilizing Multi-Agent System (MAS)
by: Mwinyi, Amir Kombo, et al.
Published: (2013)
by: Mwinyi, Amir Kombo, et al.
Published: (2013)
Detection and mitigation of ARP storm attacks using software defined networks
by: Numan, Munther, et al.
Published: (2017)
by: Numan, Munther, et al.
Published: (2017)
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
by: Bouke, Mohamed Aly, et al.
Published: (2023)
by: Bouke, Mohamed Aly, et al.
Published: (2023)
New attacks on RSA with modulus N = p2q using continued fractions
by: Asbullah, Muhammad Asyraf, et al.
Published: (2015)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2015)
An attack on N = p2q with partially known bits on the multiple of the prime factors
by: Wan Mohd Ruzai, Wan Nur Aqlili, et al.
Published: (2021)
by: Wan Mohd Ruzai, Wan Nur Aqlili, et al.
Published: (2021)
Danger theory based node replication attacks detection in mobile wireless sensor network
by: Shaukat, Haafizah Rameeza, et al.
Published: (2014)
by: Shaukat, Haafizah Rameeza, et al.
Published: (2014)
Adaptive feature selection for denial of services (DoS) attack
by: Yusof, Ahmad Riza'ain, et al.
Published: (2017)
by: Yusof, Ahmad Riza'ain, et al.
Published: (2017)
Optimization of power utilization in multi-mobile robot foraging behavior inspired by honeybees system
by: Ahmad, Faisul Arif, et al.
Published: (2014)
by: Ahmad, Faisul Arif, et al.
Published: (2014)
Energy management in mobile robotics system based on biologically inspired honeybees behavior
by: Ahmad, Faisul Arif, et al.
Published: (2011)
by: Ahmad, Faisul Arif, et al.
Published: (2011)
Rootkit Guard (RG) - an architecture for rootkit resistant file-system implementation based on TPM
by: Yew, Teh Jia, et al.
Published: (2013)
by: Yew, Teh Jia, et al.
Published: (2013)
Similar Items
-
Machine and deep learning-based XSS detection approaches: a systematic literature review
by: Thajeel, Isam Kareem, et al.
Published: (2023) -
Mitigating cross-site scripting attacks with a content security Policy
by: Yusof, Imran, et al.
Published: (2016) -
Preventing persistent cross-site scripting (XSS) attack by applying pattern filtering approach
by: Yusof, Imran, et al.
Published: (2014) -
Buffer overflow attack mitigation via Trusted Platform Module (TPM)
by: Teh, Jia Yew, et al.
Published: (2014) -
Secure coding in cross site scripting
by: Abdul Aziz, Normaziah, et al.
Published: (2011)